0% found this document useful (0 votes)
20 views

Unit 4 (E Com)

Uploaded by

nsagarishant
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Unit 4 (E Com)

Uploaded by

nsagarishant
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

Unit -4

What is Encryption?

Encryption helps us to secure data that we send, receive, and store. It can consist text
messages saved on our cell-phone, logs stored on our fitness watch, and details of
banking sent by your online account.

How does it work?

It is the procedure of taking ordinary text, such as a text or email, and climbing it into an
unreadable type of format known as "cipher text." It helps to protect the digital
information either saved on or spread through a network such as the internet on
computer systems.

1. Symmetric Encryption:

 What it is: You use the same key to both lock (encrypt) and unlock (decrypt) the
data.

 Example: Imagine you and a friend have a secret key. You use it to lock a
message, and your friend uses the same key to unlock it.

 Pros: Fast and e icient for large amounts of data.

 Cons: You need a secure way to share the key beforehand.

2. Asymmetric Encryption:

 What it is: Uses two keys – a public key (anyone can use it to encrypt data) and a
private key (only the owner of the key can decrypt the data).

 Example: Think of it like a locked mailbox. Anyone can put a letter in (using the
public key), but only you can open it (with your private key).

 Pros: No need to share the private key, only the public one.

 Cons: Slower than symmetric encryption, especially for large amounts of data.

3. Hybrid Encryption:

 What it is: Combines both symmetric and asymmetric encryption. Asymmetric


encryption is used to safely share a symmetric key, and then symmetric
encryption is used to encrypt the actual data.

 Example: You send your friend a locked box (asymmetric encryption), and inside
the box is the key for a secret locker (symmetric encryption).
 Pros: Combines the best of both methods—secure and fast.

 Cons: A bit more complex.

4. Hashing:

 What it is: A one-way function that turns data into a fixed-size value (a "hash"). It
can't be reversed, so you can't get back the original data from the hash.

 Example: Think of hashing like turning a long paragraph into a fingerprint—a


unique identifier, but impossible to turn back into the original text.

 Pros: Great for checking data integrity (if the hash matches, the data hasn't been
tampered with).

 Cons: You can't get the original data back once it's hashed.

5. End-to-End Encryption (E2EE):

 What it is: Ensures only the sender and receiver can read the message. Even if
someone intercepts the message along the way, they can't decrypt it.

 Example: Like sending a locked box that only the receiver has the key for. No one
else can open it.

 Pros: High security, protects your privacy.

 Cons: If you lose the key, you can’t decrypt your own messages.

In short:

 Symmetric = Same key to encrypt/decrypt (fast but key sharing is tricky).

 Asymmetric = Two keys (public for encrypting, private for decrypting).

 Hybrid = Uses both methods together (secure and fast).

 Hashing = One-way encryption for data checks.

 E2EE = Only the sender/receiver can read the data.

What is a Key in Encryption?

 Key: A key is a secret value that is used in an encryption algorithm to lock and
unlock data. It's like a password for data—only someone with the right key can
decrypt and read the original message.

 In symmetric encryption, the same key is used for both encryption and
decryption. In asymmetric encryption, a pair of keys (public and private) is
used.
. Data Encryption Standard (DES)

What is DES?

 DES stands for Data Encryption Standard. It was one of the first widely used
encryption algorithms and was developed in the 1970s by IBM and the U.S.
National Security Agency (NSA). It became a federal standard for encrypting
sensitive government data in the 1980s.

How DES Works:

 Block Cipher: DES is a block cipher, meaning it encrypts data in fixed-size


blocks (64 bits at a time).

 Key Size: DES uses a 56-bit key for encryption. Despite the 64-bit block size, the
key itself is only 56 bits long, with 8 bits reserved for parity (error-checking).

 Rounds: DES operates in 16 rounds of encryption, each round involving a series


of operations like substitution, permutation, and XORing with parts of the key.

Triple Encryption (3DES)

What is Triple DES (3DES)?

 Triple DES (often written as 3DES) is an encryption algorithm that applies the
Data Encryption Standard (DES) algorithm three times to each data block,
e ectively making it more secure than standard DES.

 Why Triple DES?


DES became weak over time due to advances in computational power (since it
uses a 56-bit key). 3DES was developed to enhance DES’s security by applying it
three times with di erent keys.

What is Asymmetric Encryption?

 Asymmetric encryption, also called public-key cryptography, uses two keys for
encryption and decryption:

o Public key: Used to encrypt data (this key is shared openly).

o Private key: Used to decrypt data (this key is kept secret and only known
by the owner).

In contrast to symmetric encryption, where both parties use the same key, asymmetric
encryption uses a pair of keys that are mathematically related but not identical.

How Does Asymmetric Encryption Work?


Here’s how asymmetric encryption typically works in a secure communication system:

1. Public Key for Encryption:

o The sender uses the recipient's public key to encrypt the message.

o Important: Anyone can have the recipient's public key and use it to send
encrypted messages, but only the recipient can decrypt it.

2. Private Key for Decryption:

o The recipient uses their private key to decrypt the message.

o Only the recipient knows their private key, so only they can read the
message.

Example:

 Sender: Encrypts the message using the recipient’s public key.

 Receiver: Decrypts the message using their own private key.

Why is it Called Asymmetric?

 It's called "asymmetric" because the two keys are not identical. The public key is
used for encryption, and the private key is used for decryption. The encryption
process involves a pair of keys, hence "asymmetric."

Key Features of Asymmetric Encryption:

1. Two Keys: One for encryption (public key) and one for decryption (private key).

2. Public Key: Openly shared with everyone, used to encrypt messages.

3. Private Key: Kept secret, used to decrypt messages. Only the key owner has
access to it.

4. Secure Communication: Even if someone intercepts the encrypted data, they


cannot decrypt it without the private key.

Digital Signatures -

A digital signature is a cryptographic technique used to verify the authenticity, integrity,


and non-repudiation of digital messages or documents.

 How It Works:

1. Sender: Creates a hash of the document and encrypts it with their


private key to generate a digital signature.

2. Receiver: Uses the sender’s public key to decrypt the signature and
compare it with their own hash of the document.
3. If the hashes match, the document is authentic and unchanged.

 Key Features:

o Authentication: Proves the sender's identity.

o Integrity: Ensures the message hasn't been altered.

o Non-repudiation: Prevents the sender from denying they sent the


message.

 Common Uses: Email verification, software distribution, legal documents, and


cryptocurrency transactions.

Digital signatures provide a secure and e icient way to verify the legitimacy of digital
communication.

Virtual Private Network (VPN) - --

A VPN is a service that creates a secure, encrypted connection over the internet,
allowing you to access the web privately and safely, as if you were connected to a
private network.

 How It Works:

o A VPN encrypts your internet tra ic, masking your IP address, and
routes it through a remote server.

o This makes it appear as if you are browsing from a di erent location, not
your actual one.

 Benefits:

o Privacy: Hides your online activities from hackers, ISPs, and


governments.

o Security: Encrypts your data, especially on public Wi-Fi.

o Bypass Restrictions: Helps you access geo-restricted content (like


Netflix in other countries).

 Common Uses:

o Securing public Wi-Fi connections.

o Accessing content in restricted regions (e.g., streaming services).

o Enhancing privacy while browsing.


In short, a VPN protects your data and helps you browse securely and anonymously
on the internet.

You might also like